Analysis
-
max time kernel
479s -
max time network
441s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 16:02
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.art-dept.com/photography/julia-fullerton-batten/14218/?type=preview#img_v111238W%03spcBe%EF%BF%BD$:%EF%BF%BDe%EF%BF%BD%EF%BF%BDgSR%[email protected]%04%01n
Resource
win10v2004-20231215-en
General
-
Target
https://www.art-dept.com/photography/julia-fullerton-batten/14218/?type=preview#img_v111238W%03spcBe%EF%BF%BD$:%EF%BF%BDe%EF%BF%BD%EF%BF%BDgSR%[email protected]%04%01n
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523137904844427" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2308 chrome.exe 2308 chrome.exe 3500 chrome.exe 3500 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2308 chrome.exe 2308 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2892 2308 chrome.exe 72 PID 2308 wrote to memory of 2892 2308 chrome.exe 72 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1240 2308 chrome.exe 87 PID 2308 wrote to memory of 1492 2308 chrome.exe 86 PID 2308 wrote to memory of 1492 2308 chrome.exe 86 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88 PID 2308 wrote to memory of 3664 2308 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.art-dept.com/photography/julia-fullerton-batten/14218/?type=preview#img_v111238W%03spcBe%EF%BF%BD$:%EF%BF%BDe%EF%BF%BD%EF%BF%BDgSR%[email protected]%04%01n1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee4b99758,0x7ffee4b99768,0x7ffee4b997782⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1780,i,1515943856840047926,10672854257233469220,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1780,i,1515943856840047926,10672854257233469220,131072 /prefetch:22⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1780,i,1515943856840047926,10672854257233469220,131072 /prefetch:82⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1780,i,1515943856840047926,10672854257233469220,131072 /prefetch:12⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1780,i,1515943856840047926,10672854257233469220,131072 /prefetch:12⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=1780,i,1515943856840047926,10672854257233469220,131072 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1780,i,1515943856840047926,10672854257233469220,131072 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3976 --field-trial-handle=1780,i,1515943856840047926,10672854257233469220,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5c74800878eea1e7f6dcf263e23437a97
SHA1f4944bb56c1119ec88772f1891377092a70046a8
SHA25630c8dbeefe1e95d0cab08b5f8f7e597044996d6b1b2c79d27decb1913531ab7a
SHA5127bfbb13c78158dc57ffc0ee79a292e034c28ff1a8542aff9900dfd90c8580a549562a1264b5e4d1b3752549653a168c122800af413cd998fdf6281fe53400f34
-
Filesize
1KB
MD5f9f69b4ca94cb6b082d5c919f6f967d0
SHA162bbbde8a67227a6215e3dbfce1cfb648ad94054
SHA256ec90f54f8f411e23844e567ef7655dd649971270a6b6e1034e181d4fbc6f47e0
SHA5125b790c248c649f79b55b89ad83181f231e630c6977c800953db8ab5666e8c11cd224427df9d0a1b0ee8f2c1d878ecd49f8bd7ab57574b2ff26cb91f5a9da5aea
-
Filesize
1KB
MD5abb2775c059248f58622a40eee2b6fd4
SHA18494327c51db69f58fb25bc1e8770cfd30a3c0c3
SHA25609b07746836a7991debb4667458cb45a3ec8c86633787838237c0be632458841
SHA512c9cf9a8d8aaff870820bbae809f42a17bde5ea66ec56cd053e8318a2581aa6db6bfa3f0ab573e98b20f2d683d07ab58a4d42814c51737adea922fdf9d7fed899
-
Filesize
536B
MD5c60096a0c5fb6d691fee57e6692aea6f
SHA112c5a654e2b6dd03b09a0e71e810f9778a4ef873
SHA2569fbb52e79fd194b5dc277dff72d0afeb356443b6ad9c12adee253a8a87d3aac6
SHA5120066c904a0e43625d92accdc9605e5b604ed560936c201f10776352b1e9677a493da08860eb52e89ef0f32f1509eb874592121637dd7bd5d2e08cc0d6e98bc6a
-
Filesize
6KB
MD5c70bba0f4cc9e61f3821baa98e37852f
SHA18daf374d85ef647b1874f4fe8a534d3bdfe88c5d
SHA256b54c709795df57343aee035a8e25d715ea1f3c0cfc1b8a22ee4cec13530af885
SHA5129068d85842cc9c9ece8a24bf32bdad62d82e5086f1b4f384087c68d17d439ebf2fb99ecefeea7a33d5d734dffe902e50cbee7a665c4b791872c9caec1f5b2800
-
Filesize
6KB
MD579f375831252f4cf0950fdfcd25196b6
SHA1d45bba9b56f4ef6876a57ba9dbfcc72113e0f298
SHA256efdb567ba2fc71fa5c9e0d7220a39b635813baedcb686d48717d15ae34c8b45e
SHA512fc7bfc2cf27369bded025b42cbb2d9418a26b2b876bc18eb0b52b3dd90004177deb67f344a2793f23289d3c4cbe9824b5187c1220c5056b46a99fe8d2817c737
-
Filesize
114KB
MD5fbb2c9753f0350c23d970cbd84136042
SHA12432b868070ea4185acc1b1096008c449d209e6d
SHA2561879723b077d965b235f6bae6846d75f541327bb09cc8a771397b45ab28e022c
SHA5129ebe4a3f031133a77e8df706c09dff99b76afd59b692deb2316948a225a936ff09ad3f2f3a685c83fdeb6c91efab1880b1e82b60cda9df17275e07db791a5511
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd